• Title/Summary/Keyword: Blind curve

Search Result 44, Processing Time 0.028 seconds

Fault Attack on a Point Blinding Countermeasure of Pairing Algorithms

  • Park, Jea-Hoon;Sohn, Gyo-Yong;Moon, Sang-Jae
    • ETRI Journal
    • /
    • v.33 no.6
    • /
    • pp.989-992
    • /
    • 2011
  • Recently, Page and Vercauteren proposed a fault attack on pairing algorithms and two countermeasures against such an attack. The countermeasure uses either a random scalar or a random point to blind the input points. To defeat the countermeasure using a random point, we utilize the point addition formula on an elliptic curve. As a result, we successfully defeat the countermeasure using a random point.

Optimum Blind Control to Prevent Glare Considering Potential Time Error (잠재적 시간 오차에 따른 현휘의 발생 방지를 위한 최적 블라인드 제어)

  • Seong, Yoon-Bok
    • Journal of the Korean Solar Energy Society
    • /
    • v.32 no.2
    • /
    • pp.74-86
    • /
    • 2012
  • For the improvement of environmental comfort in the buildings with the blind control, the objective of this study is to prevent the direct glare caused by the daylight inlet. During the process of solar profile prediction, time are significant factors that may cause error and glare during the blind control. This research proposes and evaluates the correction and control method to minimize prediction error. For the local areas with different longitude and local standard meridian, error occurred in the process of the time conversion from local standard time to apparent solar time. In order to correct error in time conversion, apparent solar time should be recalculated after adjusting the day of year and the equation of time. To solve the problems by the potential time errors, control method is suggested to divide the control sections using the calibrated fitting-curve and this method is verified through simulations. The proposed correction and control method, which considered potential time errors by loop lop leap years, could solve the problems about direct glare caused by daylight inlet on the work-plane according to the prediction errors of solar profile. And also these methods could maximize daylight inlet and solar heat gain, because the blocked area on windows could be minimized.

A Study on Interference Cancelling Receiver with Adaptive Blind CMA Array (적응 블라인드 CMA 어레이를 이용한 간섭 제거 수신기에 관한 연구)

  • 우대호;변윤식
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.4A
    • /
    • pp.330-335
    • /
    • 2002
  • In the direct sequence code division multiple access system, the problem of multiple access interference due to multiple access is generated. A interference cancelling receiver is used to solve this problem. The conventional interference cancelling receiver is structure of successive interference canceller using antenna array. In this structure, the difference of between method I and method II depends on updating weight vector. In this paper, the adaptive blind CMA array interference cancelling receiver using cost function of constant modulus algorithms is proposed to update weight vector at conventional structure. The simulation compared the proposed interference cancelling receiver with two conventional interference cancelling receivers by signal to interference ratio and bit error rate curve under additive white Gaussian noise environment. The simulation results show that the proposed receiver has about the gain of SIR of 1.5[dB] more than method I which is conventional receiver at SIR curve, and about the gain of SIR of 0.5(dB) more than method II. In BER curve, the proposed IC receiver about the gain of SNR of 2[dB] more than method I and about the gain of SNR of 0.5[dB] more than method If, Thus, the proposed interference cancelling receiver has the higher performance than conventional interference cancelling receivers.

ON EFFICIENT TWO-FLOW ZERO-KNOWLEDGE IDENTIFICATION AND SIGNATURE

  • Lee, Young-Whan
    • Journal of applied mathematics & informatics
    • /
    • v.29 no.3_4
    • /
    • pp.869-877
    • /
    • 2011
  • In this paper, we propose an efficient two-flow zero-knowledge blind identification protocol on the elliptic curve cryptographic (ECC) system. A. Saxena et al. first proposed a two-flow blind identification protocol in 2005. But it has a weakness of the active-intruder attack and uses the pairing operation that causes slow implementation in smart cards. But our protocol is secure under such attacks because of using the hash function. In particular, it is fast because we don't use the pairing operation and consists of only two message flows. It does not rely on any underlying signature or encryption scheme. Our protocol is secure assuming the hardness of the Discrete-Logarithm Problem in bilinear groups.

Blind Signature based on Mobile Commerce (무선 인터넷에서의 은익기반 서명에 의한 전자상거래)

  • Kim, Jang-Hwan;Rhee, Chung-Sei
    • Convergence Security Journal
    • /
    • v.8 no.2
    • /
    • pp.1-6
    • /
    • 2008
  • Designing efficient and secure electronic payment is important for M-Commerce. In this paper, we propose an efficient Micro-payment protocol that allows multiple transactions using ID-based public key encryption-system. The proposed payword system requires to generate authenticated key generated by Weil-pairing which uses an elliptic curve cryptosystem over finite field Fq for transactions. Therefore, it is more secure in known key attacks as well as man-in-the middle attacks.

  • PDF

Performance Evaluation of DSE-MMA Blind Equalization Algorithm in QAM System (QAM 시스템에서 DSE-MMA 블라인드 등화 알고리즘의 성능 평가)

  • Kang, Dae-Soo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.6
    • /
    • pp.115-121
    • /
    • 2013
  • This paper related with the DSE-MMA (Dithered Sign-Error MMA) that is the simplification of computational arithmetic number in blind equalization algorithm in order to compensates the intersymbol interference which occurs the passing the nonlinear communication channel in the presence of the band limit and phase distortion. The SE-MMA algorithm has a merit of H/W implementation for the possible to reduction of computational arithmetic number using the 1 bit quantizer in stead of multiplication in the updating the equalizer tap weight. But it degradates the overall blind equalization algorithm performance by the information loss at the quantization process compare to the MMA. The DSE-MMA which implements the dithered signed-error concepts by using the dither signal before qualtization are added to MMA, then the improved SNR performance which represents the roburstness of equalization algorithm are obtained. It has a concurrently compensation capability of the amplitude and phase distortion due to intersymbol interference like as the SE-MMA and MMA algorithm. The paper uses the equalizer output signal, residual isi, MD, MSE learning curve and SER curve for the performance index of blind equalization algorithm, and the computer simulation were performed in order to compare the SE-MMA and DSE-MMA applying the same performance index. As a result of simulation, the DSE-MMA can improving the roburstness and the value of every performance index after steady state than the SE-MMA, and confirmed that the DSE-MMA has slow convergence speed which meaning the reaching the seady state from initial state of adaptive equalization filter.

A Blinding ECDSA based on the Elliptic Curve Discrete Logarithm Problems (ECDLP를 기반으로 하는 Blinding ECDSA)

  • 전병욱;권용진
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1998.12a
    • /
    • pp.231-242
    • /
    • 1998
  • 전자 상거래에 대한 다양한 프로토타입(prototype)이 구현되고 있고, 확대 적용의 현실성이 증대되고 있는 작금의 상황을 반영하여 관련 연구가 활발해지고 있으며, 그 중에서 보다 안전하고 효율적인 전자지불방식에 대한 현실적 요구가 증대하고 있다 전자지불방식의 하나인 전자화폐는 실물 화폐와 유사한 성질들을 만족해야 하며, 이러한 성질들 중에서 필수적인 익명성을 얻기 위한 방법으로는 D. Chaum이 제안한 Blind Signature가 대표적이다. 본 논문에서는 기존의 암호시스템의 문제점을 극복할 수 있는 시스템으로써 주목받고 있는 타원곡선 암호시스템 상에서 익명성을 제공하는 Blinding ECDSA를 제안한다.

  • PDF

Influence on Driver Behavior According to Providing Collision Avoidance Information on Highway (고속도로의 전방 장해물 충돌방지정보 제공이 운전행동에 미치는 영향)

  • Jeon, Yong-Uk;Dae, Mun-Su
    • Journal of Korean Society of Transportation
    • /
    • v.27 no.4
    • /
    • pp.137-143
    • /
    • 2009
  • It is necessary to develop driving assistant information in order to prevent a rear-end collision with a crashed car which is at the blind curve on highway. Laboratory experiments were performed using a driving simulator to keep the traffic environment constant. This research was evaluated the effect of driver behavior according to providing collision avoidance information which was consisted of advisory, caution, and warning information by the dangerous degree of traffic situation. Driver behavior was evaluated to analyze the collision avoidance with a crashed car, and glance behavior was examined to measure the eye movements to the display on which provided the collision avoidance information. After experiment, the significance was evaluated on provided collision avoidance information. As the result of this research, the number of collision accident is reduced when the phased information was provided. In addition, it is clear that auditory information is more important than visual information in the case of providing the second information.

Analysis of Medical Image with CD-RAD Phantom (CD-RAD Phantom을 이용한 의료영상의 분석)

  • Kim, Chang-Bok;Kim, Young-Keun;Cho, Yong-Sung;Lee, Kyung-Sup
    • Proceedings of the Korean Institute of Electrical and Electronic Material Engineers Conference
    • /
    • 2007.06a
    • /
    • pp.369-369
    • /
    • 2007
  • The physical and visual evaluation of the identical X-rays are analyzed for medical image clarity with CD-RAD Phantom on this study. The method of measurement is to research CD-RAD by X-rays and to acquire images through image processing equipment, the image analyses are carried out by physical evaluation with statistical method through CD-RAD analyser program, and the visual evaluation of the identical X-rays is carried out by blind test for 20 observers. The result of it is that IQF value of the physical evaluation of Contrast-detail curve is 25 and IQF value of the visual evaluation is 30, so it is revealed that the physical evaluation is superior to the visual one. The special qualities of medical images have much importance of the transmission capacity of information to the image analyser, so it is concluded that 0비ective methods of the physical and visual analyses should be carried out side by side.

  • PDF

A Novel Electronic Voting Mechanism Based on Blockchain Technology

  • Chuan-Hao, Yang;Pin-Chang Su;Tai-Chang Su
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.10
    • /
    • pp.2862-2882
    • /
    • 2023
  • With the development of networking technology, it has become common to use various types of network services to replace physical ones. Among all such services, electronic voting is one example that tends to be popularized in many countries. However, due to certain concerns regarding information security, traditional paper voting mechanisms are still widely adopted in large-scale elections. This study utilizes blockchain technology to design a novel electronic voting mechanism. Relying on the transparency, decentralization, and verifiability of the blockchain, it becomes possible to remove the reliance on trusted third parties and also to enhance the level of trust of voters in the mechanism. Besides, the mechanism of blind signature with its complexity as difficult as solving an elliptic curve discrete logarithmic problem is adopted to strengthen the features related to the security of electronic voting. Last but not least, the mechanism of self-certification is incorporated to substitute the centralized certificate authority. Therefore, the voters can generate the public/private keys by themselves to mitigate the possible risks of impersonation by the certificate authority (i.e., a trusted third party). The BAN logic analysis and the investigation for several key security features are conducted to verify that such a design is sufficiently secure. Since it is expected to raise the level of trust of voters in electronic voting, extra costs for re-verifying the results due to distrust will therefore be reduced.